Secure/SAService.rem in Deltek Ajera Timesheets 9.10.16 and prior are vulnerable to remote code execution via deserialization of untrusted user input from an authenticated user. The executed code will run as the IIS Application Pool that is running the application.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/151035/Ajera-Timesheets-9.10.16-Deserialization.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46086/ | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/151035/Ajera-Timesheets-9.10.16-Deserialization.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46086/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/151035/Ajera-Timesheets-9.10.16-Deserialization.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/46086/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-03-21 16:00
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20221
Mitre link : CVE-2018-20221
CVE.ORG link : CVE-2018-20221
JSON object : View
Products Affected
deltek
- ajera
CWE
CWE-502
Deserialization of Untrusted Data